Peng Zhang 825266d5ac Update kernel to v5.10.189
This commit updates kernel to 5.10.189 to fix following CVE issue:
CVE-2023-4132: https://nvd.nist.gov/vuln/detail/CVE-2023-4132
CVE-2023-4004: https://nvd.nist.gov/vuln/detail/CVE-2023-4004
CVE-2023-20593: https://nvd.nist.gov/vuln/detail/CVE-2023-20593
CVE-2023-3863: https://nvd.nist.gov/vuln/detail/CVE-2023-3863
CVE-2023-31248: https://nvd.nist.gov/vuln/detail/CVE-2023-31248
CVE-2023-35001: https://nvd.nist.gov/vuln/detail/CVE-2023-35001
CVE-2023-3117: https://nvd.nist.gov/vuln/detail/CVE-2023-3117
CVE-2023-3611: https://nvd.nist.gov/vuln/detail/CVE-2023-3611
CVE-2023-3610: https://nvd.nist.gov/vuln/detail/CVE-2023-3610
CVE-2023-3776: https://nvd.nist.gov/vuln/detail/CVE-2023-3776
CVE-2023-3390: https://nvd.nist.gov/vuln/detail/CVE-2023-3390
CVE-2023-2898: https://nvd.nist.gov/vuln/detail/CVE-2023-2898

One of our source patches requires refresh against the new kernel
source. It was modified for missed parameter need be added in the
new kernel:
       Port-negative-dentries-limit-feature-from-3.10.patch.

After upgrading kernel, new function eth_hw_addr_set was added in
linux-headers-5.10.0-6-common. While it has already defined in the
following driver modules:
        i40e,i40e-cvl-4.10,iavf,iavf-cvl-4.10,ice,ice-cvl-4.10.
To avoid the redefinition conflict, we allow the out-of-tree drivers
to use the newly added in-tree version of the eth_hw_addr_set
function. This is achieved by undefining the NEED_ETH_HW_ADDR_SET
macro.

Verification:
- Build kernel and out of tree modules success for rt and std.
- Build iso success for rt and std.
- Install success onto a AIO-DX lab with rt kernel.
- Boot up successfully in the lab.
- The sanity testing was done by our test team and no regression
  defect was found.
- The cyclictest benchmark was also run on the starlingx lab, the
  result is "samples: 259199999 avg: 1633 max: 8817 99.9999th
  percentile: 7612 overflows: 0", It is not big difference with
  5.10.185 for avg and max.

Closes-Bug: 2029211

Change-Id: I107a0c0285ad2de39d56863cc5fed6273ad7fbd4
Signed-off-by: Peng Zhang <Peng.Zhang2@windriver.com>
2023-09-23 01:17:16 +08:00

30 lines
1.4 KiB
Plaintext

0001-kernel-std-Remove-the-old-changelog-file.patch
0002-kernel-std-Add-a-new-changelog-file-for-linux-yocto-.patch
0003-kernel-std-Add-a-kernel-config-file-for-stx-debian.patch
0004-kernel-std-Adapt-the-debian-folder-for-new-source.patch
0005-kernel-modules-sign-kernel-modules.patch
0006-Debian-align-config-file-with-stx-centos.patch
0007-Debian-update-5.10-Kernel-to-5.10.99.patch
0008-config-set-configs-needed-for-secure-boot.patch
0009-Drop-Android-patches.patch
0010-Debian-Disable-CONFIG_BNXT.patch
0011-Debian-Hardcode-net.naming-scheme-in-CONFIG_CMDLINE.patch
0012-Debian-update-5.10-Kernel-to-5.10.112.patch
0013-kernel-std-fix-proc-version-content.patch
0014-kernel-std-clean-patches-from-debian-release.patch
0015-Debian-Added-apparmor-security-module.patch
0016-debian-rules.real-Parallelize-xz-compression.patch
0017-Debian-Enable-WireGuard-config.patch
0018-Place-module-signing-keys-in-a-separate-packa.patch
0019-Upgrade-5.10-kernel-to-5.10.152.patch
0020-kernel-std-unset-LOCK_DOWN_IN_EFI_SECURE_BOOT.patch
0021-config-don-t-unset-CONFIG_EFIVAR_FS.patch
0022-Upgrade-5.10-kernel-to-5.10.162.patch
0023-Fix-badly-formatted-trailer-line.patch
0024-Upgrade-5.10-kernel-to-5.10.177.patch
0025-Disable-unprivileged-eBPF-by-default.patch
0026-Upgrade-5.10-kernel-to-5.10.180.patch
0027-config-Enable-Intel-RAPL-and-uncore-frequency-contro.patch
0028-Upgrade-5.10-kernel-to-5.10.185.patch
0029-Upgrade-5.10-kernel-to-5.10.189.patch